Searched refs:connect (Results 1 – 25 of 52) sorted by relevance
123
/openssl/doc/man3/ |
H A D | BIO_s_connect.pod | 11 BIO_do_connect - connect BIO 40 BIO_s_connect() returns the connect BIO method. This is a wrapper 43 Using connect BIOs, TCP/IP connections can be made and data 47 Read and write operations on a connect BIO will perform I/O 54 If the close flag is set on a connect BIO then any active 58 Calling BIO_reset() on a connect BIO will close any active 59 connection and reset the BIO into a state where it can connect 96 non blocking I/O is set during the connect process. 98 BIO_do_connect() attempts to connect the supplied BIO. 102 after connect() failures. [all …]
|
H A D | OSSL_HTTP_transfer.pod | 20 int connect, int detail); 85 The HTTP client functions connect via the given proxy unless the I<server> 99 I<bio_update_fn> is a BIO connect/disconnect callback function with prototype 101 BIO *(*OSSL_HTTP_bio_cb_t)(BIO *bio, void *arg, int connect, int detail) 107 callback function is invoked with the I<connect> argument being 1 and 109 On disconnect I<connect> is 0 and I<detail> is 1 if no error occurred, else 0. 110 For instance, on connect the callback may push an SSL BIO to implement HTTPS; 118 BIO *http_tls_cb(BIO *bio, void *arg, int connect, int detail) 120 if (connect && detail) { /* connecting with TLS */ 125 } else if (!connect) { /* disconnecting */ [all …]
|
H A D | BIO_f_ssl.pod | 52 The SSL BIO is then reset to the initial accept or connect state. 82 SSL BIO (using B<ctx>) followed by a connect BIO. 85 of a buffering BIO, an SSL BIO (using B<ctx>), and a connect BIO. 101 after connect() failures. 104 The call BIO_should_retry() should be used for nonblocking connect BIOs 124 to locate the connect BIO first.
|
H A D | SSL_set_session.pod | 5 SSL_set_session - set a TLS/SSL session to be used during TLS/SSL connect
|
H A D | SSL_set1_initial_peer_addr.pod | 19 representing a UDP destination address of the server to connect to.
|
H A D | SSL_set_connect_state.pod | 36 call the connect (client) or accept (server) routines. Even though it may
|
H A D | SSL_set_fd.pod | 5 SSL_set_fd, SSL_set_rfd, SSL_set_wfd - connect the SSL object with a file descriptor
|
H A D | DTLSv1_listen.pod | 43 mechanism. The idea is that when a client attempts to connect to a server it 64 AF_UNSPEC. Typically user code is expected to "connect" the underlying socket to
|
H A D | BIO_s_accept.pod | 73 connect BIOs, that is it can be a numerical port string or a 78 BIO_set_conn_port() for connect BIOs, that is it can be a numerical
|
/openssl/test/ssl-tests/ |
H A D | 17-renegotiate.cnf | 11 test-6 = 6-renegotiate-client-legacy-connect 199 [6-renegotiate-client-legacy-connect] 200 ssl_conf = 6-renegotiate-client-legacy-connect-ssl 202 [6-renegotiate-client-legacy-connect-ssl] 203 server = 6-renegotiate-client-legacy-connect-server 204 client = 6-renegotiate-client-legacy-connect-client 206 [6-renegotiate-client-legacy-connect-server] 212 [6-renegotiate-client-legacy-connect-client]
|
H A D | 17-renegotiate.cnf.in | 114 name => "renegotiate-client-legacy-connect",
|
/openssl/doc/man1/ |
H A D | openssl-s_time.pod.in | 12 [B<-connect> I<host>:I<port>] 50 =item B<-connect> I<host>:I<port> 52 This specifies the host and optional port to connect to. 140 To connect to an SSL HTTP server and get the default page the command 142 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
|
H A D | openssl-s_client.pod.in | 13 [B<-connect> I<host>:I<port>] 165 =item B<-connect> I<host>:I<port> 170 is made to connect to the local host on port 4433. 175 Host to connect to; use B<-connect> instead. 179 Connect to the specified port; use B<-connect> instead. 232 the name given to B<-connect> if it follows a DNS name format. If B<-connect> is 390 -connect smtp.example.com:25 \ 875 nor B<-connect> are provided, falls back to attempting to connect to 976 openssl s_client -connect servername:443 1025 openssl s_client -connect <server address>:443 -tls1_3 [all …]
|
/openssl/demos/sslecho/ |
H A D | README.md | 16 - Connection to the SSL server starts as a standard TCP 'connect'.
|
H A D | main.c | 286 if (connect(client_skt, (struct sockaddr*) &addr, sizeof(addr)) != 0) { in main()
|
/openssl/util/platform_symbols/ |
H A D | unix-symbols.txt | 13 connect
|
/openssl/crypto/rand/ |
H A D | rand_egd.c | 137 if (connect(fd, (struct sockaddr *)&addr, i) == 0) in RAND_query_egd_bytes()
|
/openssl/doc/designs/ddd/ |
H A D | ddd-03-fd-blocking.c | 181 rc = connect(fd, result->ai_addr, result->ai_addrlen); in main()
|
H A D | ddd-04-fd-nonblocking.c | 349 rc = connect(fd, result->ai_addr, result->ai_addrlen); in main()
|
H A D | ddd-05-mem-nonblocking.c | 401 rc = connect(fd, result->ai_addr, result->ai_addrlen);
|
/openssl/include/openssl/ |
H A D | http.h | 68 typedef BIO *(*OSSL_HTTP_bio_cb_t)(BIO *bio, void *arg, int connect, int detail);
|
/openssl/doc/man7/ |
H A D | ossl-guide-tls-client-block.pod | 145 provide the POSIX compatible I<connect> function. For example: 161 if (connect(sock, (struct sockaddr *)&serveraddr, 183 * we can connect to. 188 * as "socket" here for this and the subsequent connect and close 266 one we want to connect to. Without this information we may get a handshake 275 * to connect to in case the server supports multiple hosts. 314 printf("Failed to connect to the server\n"); 328 indicates that we have failed to connect to the server. 505 =head2 Failure to connect the underlying socket
|
/openssl/test/ |
H A D | quic_client_test.c | 195 if (!TEST_int_eq(connect(c_fd, (const struct sockaddr *)&sin, sizeof(sin)), 0)) in test_quic_client_connect_first()
|
/openssl/crypto/bio/ |
H A D | bio_sock2.c | 175 if (connect(sock, BIO_ADDR_sockaddr(addr), in BIO_connect()
|
/openssl/ |
H A D | README-QUIC.md | 59 $ openssl s_client -quic -alpn myalpn -connect host:port
|
Completed in 112 milliseconds
123